Result page:
1
2
3
4
5
6
7
1
A Simulator for Distributed Cache Managementin Friend-to-Friend Networks
Keynan Pratt,
Carey Williamson
May 2016
SIGSIM-PADS '16: Proceedings of the 2016 annual ACM Conference on SIGSIM Principles of Advanced Discrete Simulation
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6, Downloads (12 Months): 45, Downloads (Overall): 45
Full text available:

PDF
Multimedia streaming services such as YouTube and Netflix consume a staggering amount of Internet bandwidth [1]. Furthermore, traditional mechanisms such as proxy caches, content distribution networks, and redundant traffic elimination are rendered ineffective by copyright concerns, regulatory issues, and the growing prevalence of end-to-end encryption. One possible solution is a ...
Keywords:
F2F, simulation, distributed caching, parallel-DES, P2P, friend-to-friend, haskell
2
Workload Study of a Media-Rich Educational Web Site
Yang Liu,
Carey Williamson
April 2016
WWW '16 Companion: Proceedings of the 25th International Conference Companion on World Wide Web
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4, Downloads (12 Months): 20, Downloads (Overall): 20
Full text available:

PDF
Modern educational Web sites often feature a rich assortment of linked media content. In this paper, we present a workload study of such an educational Web site hosted at the University of Calgary. Three main insights emerge from our study. First, educational Web sites can generate large volumes of Internet ...
Keywords:
media, educational web site, http, technology enhanced learning, video, workload characterization
3
Decoupled speed scaling: Analysis and evaluation
Maryam Elahi,
Carey Williamson,
Philipp Woelfel
February 2014
Performance Evaluation: Volume 73, March, 2014
Publisher: Elsevier Science Publishers B. V.
In this paper, we introduce the notion of decoupled speed scaling, wherein the speed scaling function is completely decoupled from the scheduling policy used in a simple single-server computer system. As an initial result, we first demonstrate that the Fair Sojourn Protocol (FSP) scheduling policy does not work properly with ...
Keywords:
Fairness, Efficiency, Optimality, Speed scaling systems
4
On the optimal randomized clustering in distributed sensor networks
Ali Dabirmoghaddam,
Majid Ghaderi,
Carey Williamson
January 2014
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 59, February, 2014
Publisher: Elsevier North-Holland, Inc.
Cluster-based data gathering is widely used in wireless sensor networks, primarily to overcome scalability issues. While clustering is not the most efficient means of gathering data, many clustering algorithms have attempted to provide energy efficiency as well. In this paper, we first demonstrate that the general problem of optimal clustering ...
Keywords:
Data compression, Data correlation, Energy-efficiency, Clustering, Wireless sensor networks
5
Estimating instantaneous cache hit ratio using Markov chain analysis
Hazem Gomaa,
Geoffrey G. Messier,
Carey Williamson,
Robert Davies
September 2013
IEEE/ACM Transactions on Networking (TON): Volume 21 Issue 5, October 2013
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2, Downloads (12 Months): 16, Downloads (Overall): 94
Full text available:

PDF
This paper introduces a novel analytical model for estimating the cache hit ratio as a function of time. The cache may not reach the steady-state hit ratio when the number of Web objects, object popularity, and/or caching resources themselves are subject to change. Hence, the only way to quantify the ...
Keywords:
markov chain, caching, replacement policy, web, analysis
6
Performance modelling of anonymity protocols
November 2012
Performance Evaluation: Volume 69 Issue 12, December, 2012
Publisher: Elsevier Science Publishers B. V.
Anonymous network communication protocols provide privacy for Internet-based communication. In this paper, we focus on the performance and scalability of anonymity protocols. In particular, we develop performance models for two anonymity protocols from the prior literature (Buses and Taxis), as well as our own newly proposed protocol (Motorcycles). Using a ...
Keywords:
Protocol performance, Anonymous network communication
7
Navigating tomorrow's web: From searching and browsing to visual exploration
October 2012
ACM Transactions on the Web (TWEB): Volume 6 Issue 3, September 2012
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 6, Downloads (12 Months): 35, Downloads (Overall): 840
Full text available:

PDF
We propose a new way of navigating the Web using interactive information visualizations, and present encouraging results from a large-scale Web study of a visual exploration system. While the Web has become an immense, diverse information space, it has also evolved into a powerful software platform. We believe that the ...
Keywords:
Information visualization, information retrieval, visual information seeking, World Wide Web, exploratory search, faceted navigation
8
Fluid Views: a zoomable search environment
May 2012
AVI '12: Proceedings of the International Working Conference on Advanced Visual Interfaces
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 4, Downloads (12 Months): 25, Downloads (Overall): 243
Full text available:

PDF
We present Fluid Views, a web-based search environment designed to bridge overview and detail by integrating dynamic queries, semantic zooming, and dual layers. The most common form of search results is long ranked and paginated lists, which are seldom examined beyond the top ten items. To support more exploratory forms ...
Keywords:
information seeking, web search, level of detail, exploratory search, information visualization, zoomable user interface
9
Enhancing redundant network traffic elimination
Emir Halepovic,
Carey Williamson,
Majid Ghaderi
January 2012
Computer Networks: The International Journal of Computer and Telecommunications Networking: Volume 56 Issue 2, February, 2012
Publisher: Elsevier North-Holland, Inc.
Protocol-independent redundant traffic elimination (RTE) is a method to detect and remove redundant chunks of data from network-layer packets by using caching at both ends of a network link or path. In this paper, we propose a set of techniques to improve the effectiveness of packet-level RTE. In particular, we ...
Keywords:
Packet-level caching, Redundant traffic elimination, Content-aware chunking
10
Improving TCP performance in residential broadband networks: a simple and deployable approach
Maxim Podlesny,
Carey Williamson
January 2012
ACM SIGCOMM Computer Communication Review: Volume 42 Issue 1, January 2012
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3, Downloads (12 Months): 19, Downloads (Overall): 246
Full text available:

PDF
ADSL and cable connections are the prevalent technologies available from Internet Service Providers (ISPs) for residential Internet access. Asymmetric access technologies such as these offer high download capacity, but moderate upload capacity. When the Transmission Control Protocol (TCP) is used on such access networks, performance degradation can occur. In particular, ...
Keywords:
asymmetric links, residential networks, tcp
11
Meeting the fairness deadline in speed scaling systems: is turbocharging enough?
Maryam Elahi,
Carey Williamson,
Philipp Woelfel
December 2011
ACM SIGMETRICS Performance Evaluation Review: Volume 40 Issue 3, December 2012
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 4, Downloads (Overall): 30
Full text available:

PDF
In this work, we explore the notion of 'turbocharging' in speed scaling systems, and ask whether this is sufficient to preserve the strong dominance property of FSP over PS. The answer turns out to be no, but the analysis yields useful insights into the design of speed scaling systems that ...
12
Visualizing explicit and implicit relations of complex information spaces
December 2011
Information Visualization - Special issue on Visualization and Data Analysis 2011: Volume 11 Issue 1, January 2012
Publisher: Palgrave Macmillan
In this work, we describe how EdgeMaps provide a new method for integrating the visualization of explicit and implicit data relations. Explicit relations are specific connections between entities already present in a given data set, while implicit relations are derived from multidimensional data based on similarity measures. Many data sets ...
Keywords:
design, explicit and implicit relationships, www, dimensionatity reduction, graph drawing, aesthetics, information visualization
13
Experimental evaluation of asymmetric QoS in IEEE 802.11g wireless networks
Qi Gang (William) Hu,
Carey Williamson,
Abraham O. Fapojuwo
October 2011
Q2SWinet '11: Proceedings of the 7th ACM symposium on QoS and security for wireless and mobile networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 19, Downloads (Overall): 176
Full text available:

PDF
Quality of Service (QoS) can be provided in a Wireless Local Area Network (WLAN) using the Enhanced Distributed Channel Access (EDCA) mechanism specified in IEEE 802.11e. However, 802.11e WLANs are not widely deployed and not all WLAN vendors implement the 802.11e mechanisms. In this paper, we propose and evaluate an ...
Keywords:
WLAN QoS, 802.11e EDCA, asymmetric QoS, VoIP over WLAN
14
Characterizing the file hosting ecosystem: A view from the edge
October 2011
Performance Evaluation: Volume 68 Issue 11, November, 2011
Publisher: Elsevier Science Publishers B. V.
We present a comprehensive, longitudinal characterization study of the file hosting ecosystem using HTTP traces collected from a large campus network over a one-year period. We performed detailed multi-level analysis of the usage behavior, infrastructure properties, content characteristics, and user-perceived performance of the top five services in terms of traffic ...
Keywords:
File hosting services, Peer-to-peer, Performance, Content distribution, Internet measurement
15
Characterizing Organizational Use of Web-Based Services: Methodology, Challenges, Observations, and Insights
September 2011
ACM Transactions on the Web (TWEB): Volume 5 Issue 4, October 2011
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 4, Downloads (12 Months): 24, Downloads (Overall): 637
Full text available:

PDF
Today’s Web provides many different functionalities, including communication, entertainment, social networking, and information retrieval. In this article, we analyze traces of HTTP activity from a large enterprise and from a large university to identify and characterize Web-based service usage. Our work provides an initial methodology for the analysis of Web-based ...
Keywords:
Web-based services, Workload characterization, organizational use
16
Poster: Δ-Graphs: flexible topology control in wireless ad hoc networks
Ashikur Rahman,
Carey Williamson
September 2011
ACM SIGMETRICS Performance Evaluation Review - Special Issue on IFIP PERFORMANCE 2011- 29th International Symposium on Computer Performance, Modeling, Measurement and Evaluation: Volume 39 Issue 2, September 2011
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1, Downloads (12 Months): 5, Downloads (Overall): 35
Full text available:

PDF
17
Poster: on capacity maximization in wireless relay networks
Ashikur Rahman,
Hanan Shpungin,
Carey Williamson
September 2011
ACM SIGMETRICS Performance Evaluation Review - Special Issue on IFIP PERFORMANCE 2011- 29th International Symposium on Computer Performance, Modeling, Measurement and Evaluation: Volume 39 Issue 2, September 2011
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 2, Downloads (12 Months): 5, Downloads (Overall): 29
Full text available:

PDF
18
Exploiting routing tree construction in CTP
August 2011
WISA'11: Proceedings of the 12th international conference on Information Security Applications
Publisher: Springer-Verlag
Sensor nodes in a Wireless Sensor Network (WSN) are scattered in an environment to collect data. These nodes are limited in resources and cannot process the collected data or store it for long periods of time. Thus, the sensor nodes rely on routing protocols to relay the collected data wirelessly ...
Keywords:
intrusion detection, link quality routing protocols, collection tree protocol, wireless sensor networks
19
Characterizing Intelligence Gathering and Control on an Edge Network
June 2011
ACM Transactions on Internet Technology (TOIT): Volume 11 Issue 1, July 2011
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2, Downloads (12 Months): 11, Downloads (Overall): 368
Full text available:

PDF
There is a continuous struggle for control of resources at every organization that is connected to the Internet. The local organization wishes to use its resources to achieve strategic goals. Some external entities seek direct control of these resources, for purposes such as spamming or launching denial-of-service attacks. Other external ...
Keywords:
Workload characterization
20
An application-level solution for the TCP-incast problem in data center networks
Maxim Podlesny,
Carey Williamson
June 2011
IWQoS '11: Proceedings of the Nineteenth International Workshop on Quality of Service
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3, Downloads (12 Months): 25, Downloads (Overall): 153
Full text available:

PDF
Data centers have become very popular for storing large volumes of data. In particular, companies like Amazon, Google, and Yahoo! routinely use data centers for storage, Web search, and large-scale computations. The main characteristics of a data center network are high-speed links, low propagation delays, and limited-size switch buffers. In ...